{"componentChunkName":"component---src-templates-manual-template-tsx","path":"/manuals/client-user/61/serverauth-cert-cli.html","webpackCompilationHash":"d1750f6cc413894a8b5c","result":{"data":{"promoBlocks":{"edges":[{"node":{"contentful_id":"47glnSpWzXeFylv2vfQEF8","internal":{"type":"ContentfulPromotionBlock"},"title":{"internal":{"type":"ContentfulHeading"},"contentful_id":"7KIOfSfgwJnCXuvRN6CfrP","textContent":"Standing privileges are a risk with PAM","color":"black","size":"medium"},"subTitle":null,"content":{"nodeType":"document","internal":{"content":"{\"nodeType\":\"document\",\"data\":{},\"content\":[{\"nodeType\":\"paragraph\",\"content\":[{\"nodeType\":\"text\",\"value\":\"Start your journey towards a just-in-time (JIT) model with zero standing privileges (ZSP). Read 'Remove Standing Privileges Through a Just-In-Time PAM Approach' by Gartner , courtesy of SSH.COM.\\n \\n\",\"marks\":[],\"data\":{}}],\"data\":{}}]}"}},"callToAction":{"internal":{"type":"ContentfulButton"},"contentful_id":"19EUesynV2Z7HHcuJk0BAS","content":"Download Gartner research","internalLink":null,"externalLink":"https://info.ssh.com/gartner_research_privileged_access_management","assetLink":null,"anchor":null},"picture":{"internal":{"type":"ContentfulAsset"},"contentful_id":"2ClylmBswcfDx4XdO7NTmL","title":"ICON Gartner ZSP","description":"","file":{"url":"//images.ctfassets.net/0lvk5dbamxpi/2ClylmBswcfDx4XdO7NTmL/78e899153ed66aec3b03b9a2cacd112d/ICON_Gartner_ZSP_ICON_Gartner.png","contentType":"image/png"},"fluid":{"aspectRatio":1,"src":"//images.ctfassets.net/0lvk5dbamxpi/2ClylmBswcfDx4XdO7NTmL/78e899153ed66aec3b03b9a2cacd112d/ICON_Gartner_ZSP_ICON_Gartner.png?w=3000&q=50","srcSet":"//images.ctfassets.net/0lvk5dbamxpi/2ClylmBswcfDx4XdO7NTmL/78e899153ed66aec3b03b9a2cacd112d/ICON_Gartner_ZSP_ICON_Gartner.png?w=750&h=750&q=50 750w,\n//images.ctfassets.net/0lvk5dbamxpi/2ClylmBswcfDx4XdO7NTmL/78e899153ed66aec3b03b9a2cacd112d/ICON_Gartner_ZSP_ICON_Gartner.png?w=1500&h=1500&q=50 1500w,\n//images.ctfassets.net/0lvk5dbamxpi/2ClylmBswcfDx4XdO7NTmL/78e899153ed66aec3b03b9a2cacd112d/ICON_Gartner_ZSP_ICON_Gartner.png?w=1601&h=1601&q=50 1601w","sizes":"(max-width: 3000px) 100vw, 3000px"},"fixed":{"width":3000,"height":3000,"src":"//images.ctfassets.net/0lvk5dbamxpi/2ClylmBswcfDx4XdO7NTmL/78e899153ed66aec3b03b9a2cacd112d/ICON_Gartner_ZSP_ICON_Gartner.png?w=3000&q=50","srcSet":""}},"centered":true,"indentMainContent":null,"transparentBackground":null,"imageScale":70,"imagePadding":null,"name":"WIKI migration side promo block2","product":null,"funnel":null,"topic":null,"keywords":null,"type":null,"priority":null,"globalOverride":null}},{"node":{"contentful_id":"6dfNaA1UlY4bADKQk6awhs","internal":{"type":"ContentfulPromotionBlock"},"title":{"internal":{"type":"ContentfulHeading"},"contentful_id":"49Tb2wSR21P5C2cpcgMZ3","textContent":"Get Multi-cloud PAM software - for free!","color":"black","size":"medium"},"subTitle":null,"content":{"nodeType":"document","internal":{"content":"{\"data\":{},\"content\":[{\"data\":{},\"content\":[{\"data\":{},\"marks\":[],\"value\":\"PrivX® Free replaces your in-house jump hosts and combines your AWS, GCP and Azure access into one multi-cloud solution.\\n \\n\",\"nodeType\":\"text\"}],\"nodeType\":\"paragraph\"}],\"nodeType\":\"document\"}"}},"callToAction":{"internal":{"type":"ContentfulButton"},"contentful_id":"1dmQ13jyyZ46ID07eVNVFb","content":"PrivX Free","internalLink":null,"externalLink":"https://info.ssh.com/privx-free-access-management-software","assetLink":null,"anchor":null},"picture":{"internal":{"type":"ContentfulAsset"},"contentful_id":"4UUYdjING8micwZQur5o6d","title":"ICON computer (search)","description":"","file":{"url":"//images.ctfassets.net/0lvk5dbamxpi/4UUYdjING8micwZQur5o6d/1b378a0f4646075c7a4788f1afffbabe/ICON_computer__search_.svg","contentType":"image/svg+xml"},"fluid":{"aspectRatio":null,"src":null,"srcSet":null,"sizes":null},"fixed":{"width":null,"height":null,"src":null,"srcSet":null}},"centered":true,"indentMainContent":null,"transparentBackground":null,"imageScale":70,"imagePadding":null,"name":"WIKI migration side promo block1","product":null,"funnel":null,"topic":null,"keywords":null,"type":null,"priority":null,"globalOverride":null}}]}},"pageContext":{"isCreatedByStatefulCreatePages":false,"body":"<div bgcolor=\"white\" text=\"black\" link=\"#0000FF\" vlink=\"#840084\" alink=\"#0000FF\"><table width=\"100%\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" class=\"header\"><tbody><tr bgColor=\"#006a6e\" valign=\"top\"><td colspan=\"2\" width=\"324\"><a href=\"http://www.ssh.com/\"><img src=\"images/header_logo.gif\" alt=\"SSH Tectia\" width=\"324\" height=\"44\" border=\"0\"></a></td><td width=\"100%\"><img src=\"images/1x1.gif\" width=\"10\" height=\"1\" alt=\"\" border=\"0\"></td></tr><tr valign=\"top\"><td width=\"178\"><img src=\"images/navi1_left.gif\" alt=\"\" width=\"178\" height=\"26\" border=\"0\"></td><td width=\"146\" bgcolor=\"#1a797d\" background=\"images/navi1_bg.gif\"></td><td bgcolor=\"#1a797d\" background=\"images/navi1_bg.gif\"></td></tr><tr><td colspan=\"3\"><img src=\"images/1x1.gif\" width=\"10\" height=\"20\" alt=\"\" border=\"0\"></td></tr></tbody></table><div class=\"navheader\"><table width=\"100%\" summary=\"Navigation header\"><tr><td width=\"40%\" align=\"left\"></td><th width=\"20%\" align=\"center\"></th><td width=\"40%\" align=\"right\"><a accesskey=\"h\" href=\"index.html\"><img src=\"images/home.gif\" alt=\"Home\"></a><a href=\"ix01.html\"><img src=\"images/index.gif\"></a> <a accesskey=\"p\" href=\"serverauth-cert.html\"><img src=\"images/prev.gif\" alt=\"Prev\"></a> <a accesskey=\"u\" href=\"serverauth-cert.html\"><img src=\"images/up.gif\" alt=\"Up\"></a> <a accesskey=\"n\" href=\"serverauth-cert-gui.html\"><img src=\"images/next.gif\" alt=\"Next\"></a>  </td></tr></table></div><div class=\"sect2\" lang=\"en\"><div class=\"titlepage\"><div><div><h3 class=\"title\"><a name=\"serverauth-cert-cli\"></a>Using the Configuration File (Unix)</h3></div></div></div><a class=\"indexterm\" name=\"id2598258\"></a><a class=\"indexterm\" name=\"id2598267\"></a><a class=\"indexterm\" name=\"id2598274\"></a><a class=\"indexterm\" name=\"id2598282\"></a><a class=\"indexterm\" name=\"id2598288\"></a><p>When configuring the client, it must be set up to trust the CA certificate and \nto access the certificate revocation list (CRL).</p><p>To configure the client to trust the server's certificate, perform the \nfollowing tasks:</p><a class=\"indexterm\" name=\"id2598306\"></a><a class=\"indexterm\" name=\"id2598312\"></a><div class=\"orderedlist\"><a class=\"indexterm\" name=\"id2598428\"></a><ol type=\"1\"><li><p> Copy the CA certificate(s) to the client machine. You can \neither copy the X.509 certificate(s) as such, or you can copy a \nPKCS #7 package including the CA certificate(s).</p><p>Certificates can be extracted from a PKCS #7 package by \nspecifying the <code class=\"code\">-7</code> flag with <span><strong class=\"command\">ssh-keygen-g3</strong></span>.</p></li><li><p> Define the CA certificate(s) to be used in host \nauthentication in the <code class=\"filename\">ssh-broker-config.xml</code> file under \nthe <code class=\"code\">general</code> element:</p><pre class=\"programlisting\">&lt;cert-validation end-point-identity-check=\"yes\" \n                 http-proxy-url=\"http://proxy.example.com:800\"&gt;\n  &lt;ldap-server address=\"ldap://ldap.example.com:389\" /&gt;\n  &lt;ocsp-responder url=\"http://ocsp.example.com:8090\" validity-period=\"0\" /&gt; \n  &lt;dod-pki enable=\"no\" /&gt;\n  &lt;ca-certificate name=\"ssh_ca1\"\n                  file=\"ssh_ca1.crt\"\n                  disable-crls=\"no\"\n                  use-expired-crls=\"100\" /&gt;\n&lt;/cert-validation&gt;         \n</pre><p>The client will only accept \ncertificates issued by the defined CA(s).</p><a class=\"indexterm\" name=\"id2598379\"></a><a class=\"indexterm\" name=\"id2598386\"></a><a class=\"indexterm\" name=\"id2598392\"></a><p>You can disable the use of CRLs by setting the \n<code class=\"code\">disable-crls</code> attribute of the  \n<code class=\"code\">ca-certificate</code> element to <code class=\"code\">\"yes\"</code>.</p><div class=\"note\" style=\"margin-left: 0.5in; margin-right: 0.5in;\"><table border=\"0\" summary=\"Note\"><tr><td rowspan=\"2\" align=\"center\" valign=\"top\" width=\"25\"><img alt=\"[Note]\" src=\"images/note.gif\"></td><th align=\"left\">Note</th></tr><tr><td align=\"left\" valign=\"top\"><p>CRL usage should only be disabled for testing purposes. Otherwise it \nis highly recommended to always use CRLs.</p></td></tr></table></div><p> Also define the LDAP server(s) or OCSP responder(s) used for CRL \nchecks. Defining the LDAP server is not necessary if the CA certificate \ncontains a CRL distribution point extension.</p></li><li><p> If the CA services (OCSP, CRL) are located behind a \nfirewall, define also the SOCKS server in the \n<code class=\"filename\">ssh-broker-config.xml</code> file. \nThe SOCKS server is defined inside <code class=\"code\">cert-validation</code> with the \n<code class=\"code\">socks-server-url</code> element.</p></li></ol></div></div><div class=\"navfooter\"><table width=\"100%\" summary=\"Navigation footer\"><hr><tr><td width=\"40%\" align=\"left\"></td><th width=\"20%\" align=\"center\"></th><td width=\"40%\" align=\"right\"><a accesskey=\"h\" href=\"index.html\"><img src=\"images/home.gif\" alt=\"Home\"></a><a href=\"ix01.html\"><img src=\"images/index.gif\"></a> <a accesskey=\"p\" href=\"serverauth-cert.html\"><img src=\"images/prev.gif\" alt=\"Prev\"></a> <a accesskey=\"u\" href=\"serverauth-cert.html\"><img src=\"images/up.gif\" alt=\"Up\"></a> <a accesskey=\"n\" href=\"serverauth-cert-gui.html\"><img src=\"images/next.gif\" alt=\"Next\"></a>  </td></tr></table></div><div class=\"copyrightfooter\" align=\"center\"><p class=\"footer\">\n  Copyright <img src=\"images/copyright.gif\"> 2010 SSH Communications Security Corp.<br>\n  This software is protected by international copyright laws. All rights reserved.<br><a href=\"http://www.ssh.com/company/contact/\">Contact Information</a></p></div></div>","head":"<head><meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\"><title>Using the Configuration File (Unix)</title><link rel=\"stylesheet\" href=\"sshx.css\" type=\"text/css\"><meta name=\"generator\" content=\"DocBook XSL Stylesheets V1.68.0\"><link rel=\"start\" href=\"index.html\" title=\" SSH Tectia® Client 6.1\"><link rel=\"up\" href=\"serverauth-cert.html\" title=\"Server Authentication with Certificates\"><link rel=\"prev\" href=\"serverauth-cert.html\" title=\"Server Authentication with Certificates\"><link rel=\"next\" href=\"serverauth-cert-gui.html\" title=\"Using the GUI\"></head>","url":"/manuals/client-user/61/serverauth-cert-cli.html"}}}